Step-by-step instructions to connect your devices, servers, and services to WireGress
Each customer gets a dedicated gateway and IP setup — no sharing, full isolation.
Route your device's traffic through a fixed, secure IP
Install the WireGuard app on your device
Download from wireguard.com/install
Download your peer configuration from WireGress
Available in your WireGress dashboard after approval
Import the configuration into the app
Import Tunnel(s) from file
Activate the tunnel
Toggle the connection on in the WireGuard app
Route server and application traffic through WireGress
Install WireGuard
# Ubuntu/Debian
sudo apt update && sudo apt install wireguard
# CentOS/RHEL
sudo yum install wireguard-tools
Download peer configuration from WireGress dashboard
Save as /etc/wireguard/wg0.conf
Start the tunnel
sudo wg-quick up wg0
# Enable on boot
sudo systemctl enable wg-quick@wg0
Verify connection
sudo wg show
curl ifconfig.me # Should show WireGress IP
Run WireGuard in a sidecar container or use host networking mode.
# docker-compose.yml example
services:
wireguard:
image: linuxserver/wireguard
cap_add:
- NET_ADMIN
volumes:
- ./wg0.conf:/config/wg0.conf
network_mode: host
Integration guides for CI/CD, Kubernetes, and other infrastructure
Prevent failures caused by changing IPs in automation workflows
Maintain a consistent outbound identity for external APIs
Ensure external vendors always recognize your system's IP
Control outbound communication from backend systems
Avoid complex NAT gateway configurations
Provide a fixed outbound IP for Kubernetes workloads
Common issues and solutions
sudo wg showcurl ifconfig.me (should show WireGress IP)Follow these steps to get your systems connected to WireGress.